Determining Who's Using What Network Encryption on Your z/OS System: zERT is Coming!
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2017 ,
SHARE San Jose 2017
With so many corporate, industry, and government regulations regarding cryptographic protection of data in flight, as well as weaknesses discovered in existing cryptographic protocols and algorithms, z/OS administrators and auditors need to be able to assess the quality of the cryptographic network protection being applied to their key z/OS workloads. But with four different protocols (TLS, SSL, SSH and IPSec), all of the cryptographic algorithms they support, and numerous ways to configure these protocols for different types of z/OS traffic, doing such an assessment can be daunting if not downright impossible. This session describes a new z/OS V2R3 Communications Server feature called z/OS encryption readiness technology (zERT) that provides the data that you need to build a complete picture of your z/OS cryptographic network protection posture.-Chris Meyer-IBM Corporation
Back to Proceedings File Library